This just proves that you can get a Democrat masquerading as a Republican to lie, but you can’t get him to lie under oath. Brad Raffensperger was o9rdered to testify in a lawsuit over Dominion Voting Machines by far left Judge Amy Totenberg, but Raffensperger refuses to obey the court order. The Federal District Court for the Northern District of Georgia released the Halderman Report over the Dominion Voting Machines used in the 2020 election.
In that report, University of Michigan Professor of Computer Science and Engineering J. Halderman and Security Researcher and Assistant Professor at Auburn University Drew Sringall examined a Dominion machine and found that they can be easily manipulated to add, subtract, or switch votes. Raffensperger has known about this for two years and he still insists 9on using the same machines with the same vulnerabilities in 2020. It could be worse as he has authorized using software that has never been tested.
Professor Halderman wrote about his findings in a blog post after the report’s release.
Back in September 2020, the Court granted the Curling Plaintiffs access to one of Georgia’s touchscreen ballot marking devices (BMDs) so that they could assess its security. Drew and I extensively tested the machine, and we discovered vulnerabilities in nearly every part of the system that is exposed to potential attackers. The most critical problem we found is an arbitrary-code-execution vulnerability that can be exploited to spread malware from a county’s central election management system (EMS) to every BMD in the jurisdiction. This makes it possible to attack the BMDs at scale, over a wide area, without needing physical access to any of them.
Our report explains how attackers could exploit the flaws we found to change votes or potentially even affect election outcomes in Georgia, including how they could defeat the technical and procedural protections the state has in place. While we are not aware of any evidence that the vulnerabilities have been exploited to change votes in past elections, without more precautions and mitigations, there is a serious risk that they will be exploited in the future.
“The known breaches in Georgia would be sufficient to uncover and exploit every vulnerability we found—and likely others we missed. Yet MITRE’s risk assessment assumes that Georgia perfectly protects the equipment from illicit access across all of its 159 counties.
“Astonishingly, Georgia Secretary of State Brad Raffensperger, who has been aware of our findings for two years, just announced that the state will not get around to installing Dominion’s security patches until after the 2024 Presidential election.”
This was taken from a recent Raffensperger statement:
The office also announced that there will be pilots of the recently Election Assistance Commission-certified version of Democracy Suite, 5.17, in 2023. This software has not been deployed in any election in any jurisdiction as of yet.
The pilots will examine its full functionality in a real-world setting. Also, in reviewing the processes it will require an update of the nearly 45,000 pieces of voting equipment, along with the subsequent acceptance testing. This process will take tens of thousands of manhours. Therefore, the statewide move to 5.17 will occur following the 2024 election cycle. This will allow the state and counties to focus on executing municipal elections and running the Presidential cycle. It also allows the state to put together a thoughtful, thorough plan to roll out the latest software.